Kenna & VMware Carbon Black Collaborate  
Learn More >
Contact Us
Talk to an Expert
Request a demo

Kenna Blog

Thoughtful perspectives on Modern Vulnerability Management.

The NSA ❤️ Risk-Based Vulnerability Management

Growing up I loved the Spy vs. Spy comic in MAD Magazine where one spy always tried to get an advantage over the other. One tactic neither spy used, though, was publishing a list of the attacks the other spy was likely to try, which is why I was both bemused and amused when the NSA published an in-depth list of vulnerabilities that Chinese state hackers (PDF) are using.
Read More
Research

The NSA ❤️ Risk-Based Vulnerability Management

Growing up I loved the Spy vs. Spy comic in MAD Magazine where one spy always tried to get an advantage over the other. One tactic neither spy used, though, was publishing a list of the attacks the other spy was likely to try, which is why I was both bemused and amused when the…

READ MORE
Podcast

Measuring What Matters with Cyentia Institute

We discuss the fourth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 4: Measuring What Matters In Remediation.

READ MORE
Vulnerability Remediation

What is Vulnerability Remediation? Here’s a Primer

Vulnerability remediation is the patching or fixing of cybersecurity weaknesses that are detected in enterprise assets, networks and applications. Formerly a manual process, vulnerability remediation today is more automated, with advanced data science, threat intelligence, and predictive algorithms helping to determine which vulnerabilities should be remediated first.  Taking a risk-based approach helps IT and DevOps…

READ MORE
Vulnerability Management

11 Tips for Choosing a Vulnerability Management Solution

“These tips go to 11.” – Nigel Tufnel It can be daunting to choose between vulnerability management (VM) solutions when all vendors describe their offerings in very similar ways. So making the best choice for you means identifying what your organization needs, and ensuring the solutions you’re evaluating meet those needs. It’s safe to say…

READ MORE
Employee Spotlight

Employee Spotlight – Moscow Mule with Mylo Reyes

When opportunity knocks, Mylo Reyes answers the door. Mylo, a talented UX Designer, is an active participant in many aspects of life here at Kenna Security. You’ll find his good humor and thoughtful insight pop up in many places, including the company’s BIPOC Diversity and Inclusion group. Mylo seems to be equal parts intelligent, passionate,…

READ MORE
Podcast

Reporting Risk To The Board

We discuss the evolution of cybersecurity metrics and reporting to Boards of Directors.

READ MORE

5 Things Every CIO Should Know About VM

Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.

Download Now
Threat Intelligence

15+ Threat Intel Feeds Power Modern Vulnerability Management

One question we often get from customers or prospective clients is why we use 15+ threat and exploit intelligence feeds? Seems excessive, right? Why not just 4 or 5 feeds? Or 10? Why do we use more than 15 threat and exploit intelligence feeds to power the Kenna.VM modern vulnerability management platform?  The answer is…

READ MORE
Podcast

Winning The Remediation Race with Cyentia Institute

We discuss the third report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 3: Winning the Remediation Race looks at (1) how quickly and (2) how many vulnerabilities a given organization can handle. Answering two key questions: Can organizations remediate all…

READ MORE
Risk-Based Vulnerability Management

Kenna Security and VMware Carbon Black Collaborate to Provide Risk Prioritization to Cloud Workloads

The challenge of cloud-based applications is that workloads may move through several different environments that can be owned and operated by vendors with different technology. With the cloud there are no well-defined boundaries. VMware Carbon Black Cloud Workload is a product that has been designed from the ground up to protect cloud workloads that operate…

READ MORE
Vulnerability Management

Key Take-Aways for IT from the Latest Vulnerability Management Research

In some ways, IT is in a tough spot when it comes to reducing cyber risk. IT teams are usually responsible for remediating vulnerabilities within various asset groups. But even though IT groups ultimately own assets, they often don’t have full control over which assets end up where. End-user devices, for instance, have a tendency…

READ MORE
Podcast

Around the Virtual Table with Chris, Jeremiah & Ed

Today on Security Science, we have a special around the virtual table with some of the biggest names in cybersecurity discussing a wide range of topics like the securing remote worker, whether companies really moving to the cloud, and the impact of the 2020 presidential election.

READ MORE
Vulnerability Management

Digging Deeper on Vulnerability Management: Why Do Some Industries Fare Better Than Others?

When it comes to cybersecurity, there’s a lot of conventional wisdom.  Finance companies have a big target on their backs. Tech companies have the skills to get the job done. Manufacturing firms are insulated from danger with lots of custom and rare applications that few hackers would bother to develop exploits for. And the healthcare…

READ MORE
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.